-
Herald: Okay, very warm welcome everybody.
-
It's my great pleasure to announce this next talk
-
which is going to be called SigOver + alpha
-
where CheolJun Park and Mincheol Son are going
-
to be talking about signal overshadowing attacks in LTE
-
The two of them are researchers at the KIST in Korea,
-
the Korean Advanced Institute of Science and Technology
-
and I'm really interested in hearing about the exploits these two found.
-
Please give them a huge warm welcome with an applause thank you.
-
[Applause]
-
Mincheol: Thank you. Good afternoon. Welcome to our talk. The name SigOver + Alpha
-
what we're talking about is very interesting, realistic and a new attack in LTE.
-
my name is Mincheol.
-
I'm a graduate student at System Security Lab at KAIST.
-
My research interest is in cellular networks and comparison analysis.
-
CheolJun: Hi, my name is CheolJun
-
and I'm also a PhD student in security systems security lab in KAIST
-
My research interest is also cellular
-
network systems and mobile security analysis.
-
In this presentation we prepared a lot of interesting attack demo videos
-
and Mincheol will talk in the first half of the presentation
-
about some introductions on LTE network and concepts on Sig
-
over attack and broadcasting message injection using SigOver.
-
Then I will talk in the remaining part of
-
the presentation about a little more advanced attack.
-
Mincheol: Okay, let's start.
-
First of all what I'm going to talk about is the cellular network.
-
All of us use our cell phone for voice calls
-
playing games or watching a video anywhere at any time.
-
And the mobile phone has been developed from first generation to fourth generation
-
As shown in the figure on the right
-
And 5th generation services have now started.
-
Today we are going to talk about new and powerful attack
-
techniques that can be used for attacks in LTE.
-
Also we will explain some examples of attacks
-
and show demonstrations of them.
-
To understand the main contents,
-
we need a background for LTE.
-
The LTE system is largely composed of UEs such as a smartphone
-
used by your user for LTE service
-
and our base station is in charge of transmitting and receiving radio signals.
-
And our core network for the mobility management,
-
authentication and data services of the user.
-
For control messages such as radio connection,
-
The UE and base station use RRC protocols.
-
Similarly, the UE
-
and the core network sent and receive control messages with NAS protocols
-
The main part of our talk are the UE and the base station.
-
If so, how does the UE establish a radio connection with the base station
-
and use the LTE service?
-
First, the UE has to decide which base station to connect to.
-
To do this,
-
the UE scans the LTE frequency band and selects the most stable base station
-
by considering the frequency priority and signal strength of the base station.
-
After selecting one base station,
-
the UEs start the attach procedure
-
with the base station
-
First, so UE receives
-
PSS and SSS signal
-
sent by the base station.
-
In turn,
-
MIB and SIB are decoded.
-
All three messages are broadcast messages
-
sent by the base station.
-
They are used to match time synchronization
-
to know boundaries or transmission scheme and
-
to know information about the base station.
-
After the broadcast message
-
the UE establishes
-
a radio connection
-
with the base station.
-
This process is done using the RRC protocol messages after which the UE
-
Proceeds with secret setup for the NAS protocol.
-
Throughout this process,
-
the UE and the core network share the key and algorithms
-
for encryption and integrity check.
-
The security setup process is also performed
-
between the UE and the base station.
-
After this series of procedures the you
-
can attach successfully and use the LTE service.
-
And then, what attack is possible against the UE
-
connected to the network and using the service?
-
The most widely used method used so far is to use a fake base station.
-
An attacker could use a fake base station
-
that behaves like a legitimate base station,
-
causing the victim UE
-
to disconnect from the legitimate base station and connect to the fake base station.
-
This is possible because the UE
-
preferentially tries to connect to a strong base station.
-
Several attacks using FBS have been introduced,
-
including
-
man in the middle of attack,
-
denial of services, user identity leak,
-
fake emergency alert
-
and so on.
-
As such, the fake base station attack
-
using the characteristics of the radio communication
-
is actively used for research or actual attacks.
-
And then, here is the questions:
-
Is the FBS attack the only attack method using the characteristics of LTE radio connection,
-
or should the victim UEs always be connected to the FBS for wireless attacks?
-
The answer is no,
-
there is a more intuitive and powerful attack methods than FBS.
-
It is a signal overshadowing attack.
-
While the previous FBS attack
-
use the characteristic of selecting a stronger signal base station,
-
the SigOver attack uses
-
the characteristic of wireless communication
-
to decode the stronger signal
-
when different signals are transmitted as the same frequency.
-
This is listed by the figure below
-
the normal base station continuously transmits LTE signals in time and frequency.
-
The UE then receives and decodes the signal.
-
If the attacker can match the time and frequency exactly with the normal signal and
-
transmit a stronger signal than real signal
-
the UE will decode the stronger signal.
-
This is the signal overshadowing attack that overrides the LTE signal.
-
If the signal overshadowing attack is possible,
-
then what message can be used to overwrite?
-
The messages we can overwrite are those with no security protection.
-
First, there is a broadcast message.
-
The broadcast messages of base stations and signal for all users
-
with no consideration for encryption and
-
integrity checks in LTE specification.
-
Second, there is a message that can be used for an attack because
-
it is unprotected among messages transmitted only to a specific user,
-
not a broadcast message.
-
One reason that it is not is protected is a bug in the UE implementation.
-
The other is that
-
there are several messages in the specification.
-
There are low [protected?] messages before performing security setup.
-
The details of the SigOver attack will be discussed one by one.
-
First, I will explain what to serve in order to perform the SigOver attack
-
And how the SigOver attack is different from the existing FBS attack
-
and what kinds of attacks are possible using broadcast messages and SigOver.
-
Lastly, CheolJun will explain attacks using unicast messages
-
and then discuss something like
-
countermeasure and future works.
-
So first there are some challenges and questions for the SigOver attack.
-
First, we should consider which part of the signal we override.
-
If too many signals are overwritten
-
the UE will now receive no normal signals causing only those effects such as jamming
-
On the contrary,
-
if too few signals are covered
-
the difficulty of the attack increases and the
-
UE may not be able to decode properly.
-
The second challenge is how to synchronize time and frequency.
-
This is the most important challenge in SigOver attack where the attack signal
-
must be accurately overwritten on the signal of the normal base station.
-
Finally, how much area is okay,
-
even if the signal is transmitted like a normal base station,
-
there may be a slight error in time or frequency.
-
Therefore it is necessary to know how much
-
accuracy is required for the UE to properly decode the signal.
-
I will explain the details of these three challenges and questions
-
to answer about the first question.
-
Let's look at the LTE frame structure first.
-
An LTE frame consists of multiple subframes and a subframe has
-
multiple symbols and the message is included in our subframe,
-
meaning that there are various options to be overshadowed.
-
Symbol overshadowing requires precise synchronization.
-
So success rate is hard to guarantee
-
on the other end, frame level overshadowing requires to rewrite multiple subframes
-
or multiple messages. It can also affect other normal messages.
-
So it is quite natural to overshadow in the subframe level.
-
Next, let's look at the time synchronization first along synchronization issues
-
Attacker's subframe and legitimate subframe
-
must arrive at the UE simultaneously
-
in order to override our particular subframe accurately.
-
For simplicity, let's assume there is no propagation delay for now.
-
The attacker utilized synchronization signal called PSS and SSS
-
to get accurate time synchronization as they are sent
-
periodically from the legitimate base station.
-
But concretely, first, the attacker issues PSS, SSS
-
to get frame timing of legitimate base station,
-
meaning that the attacker can identify the frame timing t0, t1, and t2.
-
Second, once the attacker runs the timing,
-
she can predict the timing of the target subframe,
-
since each subframe has fixed size which is one millisecond.
-
For example, if the attacker overshadows the second subframe of frame 566
-
then she can transmit the malicious subframe at t2 plus one millisecond.
-
Now the attacker signal arrives at the UE simultaneously.
-
Since we assume that there is no propagation delay.
-
However in real life there is propagation delay depending on the location,
-
meaning that the zero will be delayed due
-
to the propagation delay or PSS and SSS.
-
Also, if the attacker is located far from the UE,
-
more delay would be added.
-
The delay could be compensated if the attacker precisely locate
-
the UE and the base station.
-
But it is not realistic in the wild
-
the delay is up to some maximum value
-
because they are located within range of the base station.
-
So in practice there is a delay that cannot be compensated
-
so subframes cannot be aligned exactly
-
so then we can count on the LTE UE
-
LTE is designed to be reliable especially in outdoor environments.
-
In outdoor UE can move with using point or so there is a reflect effect because of buildings.
-
So we expected that the UE would compensate
-
such small errors if the subframe is somewhat is synchronized but not exactly.
-
So the question is how much can the UE tolerate this delay error?
-
Since it is chipset dependent we measured the max delay tolerance of two COTS smartphones
-
and result is around 12 and 11 microseconds each
-
And both results exceed max delay of
-
the urban base station which is around eight microseconds.
-
So this means that the attack can succeed
-
regardless of the location of the base station
-
and the victim UEs.
-
In summary, the attacker can be anywhere within the range
-
of the base station to succeed the attack.
-
The last one to solve is frequency synchronization.
-
LTE standard specifies the minimum frequency accuracy that
-
LTE base station must have as 50 ppb.
-
So for precise synchronization,
-
the attacker needs to use a sufficiently accurate frequency
-
after that, residual frequency error can be compensated by CFO
-
correction algorithm.
-
Since the SigOver was wrong on a typical
-
SDR kit with an inaccurate oscillator, we adopt GPSDO.
-
To improve its frequency accuracy.
-
GPSDO guarantees 25 ppb accuracy
-
without GPS antenna and 1 ppb with GPS antenna.
-
Lastly we can compensate residual frequency error by
-
by PSS/SSS-based CFO correction.
-
Here's the summary
-
of the main questions and answers.
-
We overshadows subframe units using PSS/SSS.
-
for time synchronization and using GPSDO and CFO
-
correction for frequency synchronization.
-
Finally, COTS UE is generous enough to cover the entire range of
-
the urban base station
-
In short, an attacker located in the range of the base station can
-
overshadow broadcast messages to any victim within the base station coverage.
-
Next before examining the difference between SigOver and FBS,
-
I will explain the process of SigOver attack.
-
First the attacker collects necessary values by listening to
-
the broadcast message of the normal base station.
-
This process is necessary because information about base
-
station is required to disguise the attacker signal
-
as that of a normal base station.
-
Next the attacker creates a subframe
-
that contains the messages to use for the attack.
-
And now the attack begins
-
first the attacker received the PSS and SSS
-
signals of the normal base station and synchronizes time with the base station
-
then send the malicious subframe that she made
-
at the precise timing.
-
Finally the UE receiving the signal receives a malicious message
-
by decoding the articles of frames stronger than
-
the signal of the normal base station.
-
Here's our test environment to verify the SigOver.
-
We implement the SigOver by using open source
-
LTE stack and we used USRP series for radio transmission.
-
We also such as
-
iPhone XS or galaxy S9
-
to verify this attack.
-
In the remainder of this talk I will talk about performance of
-
SigOver and attacks that can be launched using SigOver.
-
Okay, so far
-
I have shown that SigOver can be used in projects
-
but both FBS and SigOver can inject malicious broadcast messages to the UEs
-
So what is the difference between SigOver and FBS?
-
Or what is the advantage of SigOver?
-
The basic advantage of SigOver compared with
-
fake base station comes from the fact that
-
the SigOver does not need connection establishment to inject the message.
-
This has multiple implications.
-
Another advantage is power efficiency.
-
SigOver does not require so strong power because
-
the attack signal only needs to be higher enough to cover the original signal
-
called capture effect.
-
It shows 98% success rate on 3dB higher power than the legitimate
-
base station. However, the FBS
-
requires much stronger power than the SigOver.
-
This is because the FBS needs to break the
-
current connection between the victim UE and the legitimate
-
base station.
-
Next I'll talk about what we can do with SigOver and broadcast messages.
-
I have explained that there is no connection between the victim UE
-
and the SigOver attacker
-
It means that
-
the UE can keep communicating with the legitimate
-
base station or
-
network during the attack.
-
For example
-
the SigOver can inject a malicious message while the UE is on phone
-
However, the UE cannot communicate with the network
-
after attaching to the FBS.
-
So the UE might fall in the denial of services.
-
Let me show you some possible attacks using SigOver, but
-
not feasible using FBS.
-
First one is signaling storm attack
-
in general signaling storm occurs through a botnet
-
but the SigOver can launch the attack without using the botnet.
-
The SigOver exploits a broadcast message called SIB-1
-
Everyone especially the tracking area code
-
by changing the tracking area code to new one,
-
the attacker can trigger tracking area update
-
procedure of the victim UE
-
which is sent to the core network.
-
All UEs in the attack range
-
may continuously receive fake SIB-1 which caused tracking area update
-
storm to the core network.
-
FBS can do the same
-
but as you expected
-
the legitimate network would be safe
-
from this attack because the FBS is not connected to the legitimate core network.
-
This is the demonstration of signaling storm
-
the program in this screenshot signaling messages of the UE
-
first the attacker injecting malicious paging message.
-
This malicious paging messages required for the UE to receive a SIB-1
-
Then, the attacker will overshadow malicious SIB-1 message
-
Then the UE generates signaling
-
to the network
-
We evaluated
-
amplification factor of signaling storm attack
-
In normal situation a UE send about 45 service request message
-
corresponding to over 600 signaling messages per hour
-
Signaling storm using SigOver can generate around
-
21,000 tracking area request corresponding to around 400,000 signaling messages per hour
-
In summary, signaling storm can generate 640 times
-
more signaling messages per UE.
-
The second is a selective DoS attack using SIB-2.
-
In SIB-2 there is a field to prevent access of
-
the UE for effective data service in a disaster situation.
-
If we manipulate this field we can prevent
-
UEs from sending service requests to the base station.
-
Of course we can also adjust the barring time
-
furthermore,
-
In the recent specification, barring service is not only divided into signaling
-
and data but also divided into details such as voice call,
-
video calls, and SMS.
-
Therefore selective DoS is possible.
-
For example all other services are possible but only voice service.
-
It's not available.
-
The selective DoS attack was verified by Galaxy S9 and succeed
-
this attack is also
-
only possible with Sigover
-
Even if the UE connect to the FBS and received the wrong SIB-2.
-
The FBS cannot make this attack
-
because the normal SIB-2 is received again
-
when the UE is connected to the normal base station. Okay,
-
this is the demonstration.
-
It would be nice to show a video of selective DoS, but not ready.
-
So this video is a DoS attack
-
using excess barring
-
the UEs can use normal data services
-
and also voice calls.
-
Okay.
-
After the SigOver attack
-
by the UE
-
Victim UEs receive malicious paging and
-
SIB-2 messages.
-
And uh
-
the UE
-
Normal service is not available
-
even after the attacker program is terminated.
-
The normal service is not available too
-
Okay.
-
The following is an attack using
-
IMSI paging. In the figure on the left,
-
a UE that is normally attached.
-
is released in the idle state by releasing radio connection when
-
not using LTE data
-
At this time,
-
If there is a service request for the UE from the networks,
-
the base station sends a broadcast message paging
-
to inform the UE
-
the identifier used at this time is a temporary ID of the UE called GUTI.
-
However, if paging is sent using the unique ID
-
of the UE called IMSI,
-
The UE will disconnect and reattach according to the behavior
-
defined in the standard.
-
This alert, a DoS attack on the UE that is using the LTE service.
-
This is IMSI paging demo
-
This is our testbed setup
-
There is a lot of attacker's PC and USRP.
-
Victim UE receives
-
the voice call
-
the attacker inject a paging message with the victims IMSI
-
due to the IMSI paging,
-
the voice call is disconnected.
-
The final attack I will introduce is a fake emergency alert attack
-
This attack uses SIB-12,
-
which is used for a lot of systems in normal networks.
-
The process of using CMAS is as follows.
-
Three messages:
-
SIB-1, SIB-12. and paging
-
are involved in CMAS process.
-
based on this process.
-
The attacker overshadows the SIB-1
-
SIB-12 and paging messages.
-
For attack,
-
victim phone is connected to the legitimate
-
base station
-
and attacker
-
synchronizes
-
time and frequency with the legitimate base station.
-
This is fake emergency alert
-
message
-
to sum up briefly,
-
we have designed and implemented a signal overshadowing attack
-
Using the fundamental weakness of wireless communication,
-
the SigOver attack is more powerful than the FBS attack
-
in terms of power efficiency and the connection between the UE
-
and the normal base station can perform various attacks.
-
As an example, I showed demonstrations of four attacks.
-
Then what can you do with unicast injection attack?
-
The answer of this question will be explained in detail by CheolJun.
-
CheolJun: Hi again and thank you Mincheol.
-
So as Mincheol said,
-
what else can we do with the unicast SigOver injection attack?
-
So when we go back to the fake base station attack,
-
there have been various attacks using fake base station
-
as an example of an existing FBS attack man in the middle
-
attack can be used for injecting, stealing or eavesdropping victim's information.
-
If the fake base station is not an LTE base station but a 3G or 2G base station,
-
attacker can cause a greater damage to the victim's privacy.
-
But actually these attacks are quite limited to use
-
these attacks all assumed that the victim is already connected to the fake base station
-
but in a static situation
-
in order for a UE
-
to pass over to the
-
fake base station,
-
The fake base station signal must be about 40 dB
-
Or 10,000 times larger than the commercial one.
-
This is because the fake
-
base station need to break the current connection between victim UE
-
and legitimate base station
-
operating
-
fake base station with a strong signal requires a lot
-
of resources and increases the chance to be detected.
-
However SigOver can solve these limitations
-
by injecting unicast messages attacker can force victims to attach to the
-
fake base station.
-
So won't the unique text message.
-
The RC connection release message is message delivered by the base station to the U.
-
E.
-
It is used to command the release of an RC connection.
-
So when the U. E. Receives this message
-
it will disconnect from the existing connection
-
and plus unicorns messages can have additional fields.
-
One of the additional fields.
-
The redirected carrying full field is used to indicate the
-
next frequency where the you we shall connect to.
-
UE uses this information to select an acceptable base station to camp on.
-
Also the redirected frequencies can be not only for
-
lt base stations but also for three G.
-
Or two G. Base station which is more vulnerable.
-
And the another additional fields is idle mode mobility control. In full field.
-
This field is used to provide dedicate sales, election rez election priorities.
-
When the research is for the base station
-
it does not check all the frequencies.
-
Instead it checks only selected frequencies based on frequency
-
previously connected or frequency received from the network.
-
So we noticed that when the UE is redirected to a non
-
searching frequency you we did not redirect it to that frequency.
-
However when a non non searching frequency was
-
included in the idle mode mobility controlling fulfilled
-
you we was redirected. Well even though it was a new frequency,
-
the figure actually shows that the U. E.
-
Is redirected to another base station After receiving on RC connection release
-
message with a redirected carrying fulfilled
-
and idle mode mobility controlling fulfilled.
-
You can see that the radio
-
frequency channel number representing the communication
-
frequency of the base station has changed from 100 to 2600.
-
So
-
if the attacker can inject this message to the victim, Ue
-
attacker can force victim uE to move to the faith base station
-
in order to inject this RC connection release message
-
injected messages should be decoded on the U.
-
E.
-
To do this.
-
More efforts are required than when injecting a broadcast message.
-
Firstly
-
when injecting broadcast message,
-
attacker only had to consider base stations configuration to inject the message
-
but to inject the unique cast message.
-
Attacker also have to consider only additional information like us I. D. R. N. T. I.
-
Which is a temporarily identify rare sequence number message format and so on.
-
Moreover, the message must be set correctly in the right place.
-
UE does not decode all the messages over the air,
-
but only because what it needs to decode.
-
The location of the broadcast message is common space and every
-
year we have to decode the message on the common space,
-
but the location of the unique cast message is a US specific space
-
and
-
it is determined according to the R. N. T. I.
-
So
-
the message should be decoded at the U. S. Specific space.
-
With these extra efforts. Unicorns messages can also be injected. Fear sick over
-
now,
-
I will introduce attack scenarios using RC connection release message injection
-
in this attack,
-
the attacker is assumed to know the M Z or R N T I. Of the victim.
-
We also assume that an attacker is located where he can
-
hear signals from legitimate base station such as victim you.
-
E
-
Attack Scenarios can be divided into two.
-
First situation is when there is a vulnerability on the device
-
in this case,
-
I'll take her in this to know M Z or R and T I.
-
If the victim UE has the vulnerability that accepts
-
security unprotected message even after the security activation,
-
the attacker can easily inject the unique last message.
-
We could found this vulnerability while
-
developing methods to test devices vulnerability.
-
The second situation is when there is no vulnerability on the device
-
in this case
-
the attacker needs to know the MZ.
-
Then
-
the attacker needs to inject message before the
-
secret activation
-
for this attack. There need additional technical implementations.
-
Actually, this implementation is in progress.
-
Now,
-
the first scenario is when there is see a vulnerability in the U. E.
-
This UV has a vulnerability that receives unprotected messages
-
even in the presence of a security context.
-
The victim UE is now connected to the
-
legitimate network and has finished the security process.
-
So the victim um he has a security context and it is using normal cellular service.
-
Then
-
the attacker injects on unprotected RC connection release message on the U. E.
-
Due to the vulnerability
-
the U. E. Except
-
security. Unprotected RC connection release message.
-
Then the U.
-
We disconnect the existing connection and is redirected to the
-
attacker state base station and request for the connection.
-
The second scenario is when there is no vulnerability on the
-
the victim, UV.
-
Is now connected to the legitimate network and he has finished the security process
-
so the victim um he has a security
-
context and it only accept security protected messages.
-
Thus the attacker cannot inject messages for now.
-
So attacker must delete the user US security context in
-
order for the victim to receive on our Attackers unprotected messages
-
to do this.
-
The attacker injects a mg paging message
-
According to the three GPP specification.
-
When you we received the MG patient message,
-
it should immediately terminate all service
-
sessions deletes parameters including security key.
-
So by injecting mg paging message article
-
can delete the security context of the victim
-
after you terminate the existing connection.
-
It's talks over the attached procedure with the base station.
-
Before the victim usually finishes the security procedure,
-
the attacker injects on RC connection release message
-
When there is no security context.
-
UE is allowed to receive the security unprotected RC connection release message.
-
Therefore the U.
-
E processes the Attackers message and sends a
-
connection request to the attacker's face face station
-
so far we have introduced a tax that brings target victims to the
-
base stations
-
but existing big base station attack can bring all the unspecified us to it
-
from on FPs Attackers point of view
-
it may be easier
-
and better to attach all the um around
-
then
-
we need to know
-
if this takeover attack can do the same thing
-
in this attack.
-
The attacker constantly monitors down like messages from
-
the commercial base station to acquire are.
-
NT I from RC connection setup message.
-
Once the attacker gets the R. N. T.
-
I, attacker injects the RC connection release message,
-
attacker can repeat the entire process until he brings the all the US around.
-
To verify this attack. We used galaxy s. four.
-
The Galaxy S four is the one of the vulnerable device that
-
receives an unprotected message even in the presence of a security context.
-
This vulnerability was discovered while
-
studying methods to test devices vulnerability
-
in this case we could inject on RC connection release message to the U.
-
E without deleting the security context
-
to inject the RC collection release message.
-
We used free open source LT software, S R S L. T and U S. R. P X. 310.
-
When the U. E. Is normally connected to the cellular network.
-
We injected crafted message to redirect the victim
-
UE to the attacker state base stations,
-
frequency 363.
-
Okay.
-
The injected message contains the redirected carrying
-
fulfilled and idle mode mobility control.
-
In fulfilled.
-
Redirected carrying full field is set to the lT frequency type
-
And contains 363
-
the frequency of fake face station.
-
The idle mode mobility control and fulfilled contains a list
-
of normal base stations frequency and an attacker's frequency.
-
At this time
-
the priority of Attackers frequency is set to the highest to
-
ensure that the victim's definitely passes over the fake face station.
-
Here is the demonstration of the attack.
-
Mhm.
-
So at the first time
-
the
-
Victim's phone is connected to the alleged to make base station
-
100
-
And Autocracies Operating
-
Base Station 3 6 3.
-
Then the attacker injects the message.
-
And as you can you could see at the monitor the signal
-
was injected and the injected message has the contents of as follows.
-
And this is same with what I said before.
-
And then as you can see at the
-
base stations, monitor the victim's phone is connected to the
-
base station.
-
And if you see the package during the attack
-
do you?
-
That one is the injected message.
-
After that the victim's phone makes a new connection with the fake base station.
-
So it moved from 100 to the 363.
-
So after this attack we could do anything like me in the middle attack and so on.
-
So in the previous previous demo the victim you we was connected to a commercial
-
base station and then moved to a faith base station that had never been connected.
-
Let's sum up the big base station attack using sick over
-
first. This attack requires much less power and it's easier than
-
the traditional fake base station attacks.
-
As a result,
-
the chance to be detected decreases and the effective
-
range increases
-
2nd. The attacker can choose victim to move to the big base station
-
since the attacker injector unicorns message only the targeted um is affected.
-
Therefore the chance to be detected also reduced.
-
And it allows the attacker to definitely forced the
-
target to attach to a big base station.
-
Finally,
-
The attack was fake.
-
Base station can be not only LT base station but also a 3G or two G base station.
-
As the 3G or 2G base stations are more vulnerable.
-
Attacker can perform more severe attacks
-
and now I'm going to talk about some countermeasures.
-
Discussion conclusion and future. Works
-
for future. Works
-
to make this attack possible for all the U. S.
-
Actually, additional implementations or needed
-
first issued to be implemented to find out the identity of the victim using MZ.
-
An attacker can do this by monitoring the RC connection,
-
settle message after sending the MG paging.
-
Actually it is already possible but it must
-
be optimized with injecting techniques in real time.
-
Second,
-
it should be made implemented to inject message before the security process ends
-
to do this. There is a little time to inject messages. As you can see at the figure
-
hardware optimizations are necessary,
-
although there are some things that need to be implemented.
-
We expect that this attack will be possible on every U. E.
-
If the hardware is fully optimized.
-
And for the countermeasures for this attack,
-
the secure solution against sick over attack on
-
the message is to use digital signature.
-
Currently
-
only a single injected message can cause a long term denial of service.
-
Once the message is protected with a digital signal signature,
-
it it can prevent the attacks introduced so far.
-
Plus
-
the attack cost would be increased.
-
This is because the attacker have to inject wrong message continuously
-
to cause denial service in the presence of the digital signature.
-
Moreover,
-
it becomes possible to detect the presence of the attack.
-
Actually, this is possible because from the 5G
-
operators public key will be stored in the using
-
In fact three GPP.
-
is recently studying the FPs problem and
-
lack of integrated protection of broadcasting information
-
and since Ho jin first published sick over attack on broadcast message.
-
In last august we have received many requests to request release the code.
-
Attack code as an open source.
-
However, we have some reasons that we can't.
-
The first reason is that according to
-
the GSM A on organization for cellular carriers
-
said the GSM a have no objection to any security research being open sourced where
-
there is a clear security benefit and there is no risk posed to innocent users
-
releasing this code clearly has some security benefits.
-
However, unfortunately
-
the proposed attack can affect a large number of innocent users around.
-
So it might be hard to release the arctic coat.
-
And another reason is the quality of the codes.
-
Thank you.
-
Mm hmm.
-
Currently
-
the code we made is not well organized to make it open source.
-
In conclusion,
-
we presented single over attack physically overwriting specific self frames.
-
Seek over is a new exploit on unpatched an insecure channel on LT network
-
Comparing two attacks using fake face stations.
-
Sick over is way cheaper and healthier.
-
Also, we found new attacks on physical channel
-
by injecting broadcast messages.
-
We could cause denial of service access
-
borrowing signaling stone and fake emergency alert.
-
And by injecting unique cast message we could force
-
targeted victim to move to the fake base station.
-
Finally,
-
I expect this sick over attack will be used in the wild.
-
Therefore
-
not only cellular networks but all the systems based on the cellular networks
-
such as equal to everything can be affected
-
in the future. Mobile communication technologies such as five G and six G R.
-
Developed
-
So more secure systems should be made
-
by considering the security of the physical layer
-
which was not considered before.
-
Therefore,
-
I strongly suggest three TPP to use digital
-
signatures for physical channel despite its difficulty.
-
Thank you.
-
And for the last we have responsibly disclosed
-
these attacks to the GSM A and Qualcomm.
-
Thank you for listening And if you're having any questions please let us know.
-
And if you're having any long questions,
-
please email us through the emails on the slide
-
and
-
the photo is our left photo and my supervisor is younger kim.
-
Maybe some of you would have heard about him
-
because he's doing a lot of researches about security.
-
So
-
anyway, thank you.
-
All right, thanks you too. So far we have around 10 minutes for questions.
-
So if you have questions for the speakers, please go to one of the room mix.
-
And well for let you ask your question,
-
do we already have people lined up?
-
Let's start with a question from the signal angel.
-
-- There's one question
-- are these methods similar
-
or the same use
-
-- by law
-- enforcement and the user mentioned stingray for an example.
-
Ah pardon please?
-
Where where are you? Can you raise your hands? I can say okay.
-
-- How can you say the
-- question from the internet. So
-
-- are
-- these methods similar?
-
The same used by the law enforcement,
-
Low enforcement police.
-
Yeah, maybe
-
it might be possible.
-
But actually it is as I know using the frequency
-
that legitimate basis stations is already like illegal to use.
-
So
-
I think that cannot be the solution.
-
Alright. I actually don't see anybody yet but there is one at Mike three Please.
-
Yes. So you show us sub frame what you replace it?
-
Why can't your hash
-
the values for integrity.
-
So the replacements will be kind of hard to do.
-
Maybe that also can be your problem and solution, but using hash right,
-
I said probably.
-
-- So
-- just to check some the full frame, so if you replace the suffering,
-
that should be involved.
-
Yeah, but that can be a solution,
-
but I think we have to think about how
-
to connect a secure connection at the first time.
-
If we don't have anything between like
-
U e and D network,
-
maybe sending some hash also will be challenged maybe
-
is that can be a solution to your question.
-
There you go.
-
-- Yes, so I'm not
-- sure if I understood, so, you know that I could
-
Have,
-
let's say 10 frames,
-
-- can you replace
-- suffering too?
-
Right,
-
yep,
-
-- yes, So if all
-- The 10 frames will be harsh,
-
your replacement will be detected.
-
Is it possible on multi level
-
-- to change the
-- standard to have some hashing or integrity?
-
Yeah, maybe that will be possible,
-
but I think we need another way to transfer the hash value to check the connection.
-
Well, I think that can also be another solution.
-
Alright, let's go to mike wanda.
-
-- Um I would like to know if you know what
-- your personal
-
opinion and feeling
-
-- is um if this will
-- be mitigated
-
-- by the vendors and the standard
-- bodies,
-
I mean, will they fix it?
-
Ah in the future. Right.
-
-- Of course. In the future they cannot fix it in
-- the past. Right?
-
Yeah, so
-
maybe as I said before,
-
like Jessamy is already like considering these
-
attacks and they have some regular meetings,
-
Maybe the last meeting was in Nevada in november. And maybe in the future they will
-
but not for now. So
-
maybe you have to ask
-
If there is any person from three g. p. p.
-
Okay.
-
Okay. Alright. Thanks.
-
Does the Signal angel have any other questions? No.
-
-- Then I think this concludes the question and answer section. Thanks
-- again.
-
Thank you.
-
Yeah.
-
Mm hmm hmm hmm hmm hmm hmm hmm hmm hmm hmm hmm hmm hmm.
-
Yeah.
-
Okay.
-
Thank you.
-
Mm hmm
-
mm hmm.
-
Okay.